Cyberwarfare

Results: 11990



#Item
551Computer network security / Cyberwarfare / Markup languages / Cross-platform software / PHP / Application firewall / Web application firewall / ModSecurity / Firewall / Comment / Computer security

http://www.sektioneins.de Shocking News in PHP Exploitation 당신을 놀라게 할 충격적인 PHP 익스플로잇 기술들 Stefan Esser <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2010-03-01 13:38:20
552Security / Government / Safety / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
553Game theory / Cyberwarfare / Bitcoin / Denial-of-service attacks / Denial-of-service attack / Nash equilibrium / Botnet / Best response

Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools Benjamin Johnson1 , Aron Laszka2 , Jens Grossklags3 , Marie Vasek4 and Tyler Moore4 1 2

Add to Reading List

Source URL: fc14.ifca.ai

Language: English - Date: 2014-02-18 12:20:19
554Security / Computing / Carnegie Mellon University / Computer security / Cyberwarfare / Computer network security / Computer emergency response team / CERT Coordination Center / National Cyber Security Centre / Cert / Threat / Organisation of Islamic Cooperation

APCERT Secretariat: JPCERT/CC Japan Computer Emergency Response Team Coordination Center Contact: URL: www.apcert.org

Add to Reading List

Source URL: www.apcert.org

Language: English - Date: 2016-03-16 04:50:40
555Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

Add to Reading List

Source URL: www.trailofbits.com

Language: English - Date: 2016-04-15 11:36:17
556Computing / Cyberwarfare / Computer security / Computer network security / Cybercrime / Spamming / Social engineering / Botnet / Web threat / Malware / Vulnerability / Computer virus

Fighting the ‘Good’ Internet War Dan Cvrˇcek† and George Danezis 1 University of Cambridge, UK & Brno University of Technology, CZ. 2

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:56
557Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-03-16 05:52:51
558Security / Safety / Prevention / National security / United States Department of Homeland Security / Cybercrime / Cyberwarfare / Computer network security / Computer security / Counter-terrorism / Homeland security / Texas Department of Public Safety

TEXAS HOMELAND SECURITY STRATEGIC PLAN: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the Priority Actions aligned with each Objective in the Texas Homeland Security Strategic Plan 2015

Add to Reading List

Source URL: www.txdps.state.tx.us

Language: English - Date: 2015-10-22 14:12:04
559Security / Computer security / Cyberwarfare / Formal methods / Logic in computer science / E-commerce / Secure communication / Cryptographic software / Formal verification / Cryptographic protocol / Vulnerability / ProVerif

More Secure Software Systems by Formal Verification, Property-Based Testing, Secure Compilation, and Dynamic Monitoring Cătălin Hrițcu Inria Paris, Prosecco team

Add to Reading List

Source URL: prosecco.gforge.inria.fr

Language: English - Date: 2015-12-15 12:26:17
560Computing / Security / Cyberwarfare / Computer security / Computer network security / Crime prevention / National security / Secure communication / Threat Stack / Threat / Cloud computing security / Cloud computing

T HR E AT STACK + AMAZON IN SP ECTO R REA C H I NG CLO UD SEC U RI T Y IN DE P TH & SC A L E Achieve Stronger Security in the Cloud

Add to Reading List

Source URL: www.threatstack.com

Language: English - Date: 2016-02-17 08:56:28
UPDATE